sysTPLService.exe

HPText.AssemblyProductService

TLAPIA

The application sysTPLService.exe by TLAPIA has been detected as a potentially unwanted program by 1 anti-malware scanner with very strong indications that the file is a potential threat. It runs as a separate (within the context of its own process) windows Service named “sysTPLService”. While running, it connects to the Internet address notifier5.avira.com on port 80 using the HTTP protocol.
Publisher:
TLAPIA  (signed and verified)

Product:
HPText.AssemblyProductService

Description:
sysTPLService

Version:
1.0.1.1

MD5:
a7ca51ebfdae8d4610d4e1e3a82a4c6a

SHA-1:
1eb8b6cb3cf2416c5938d4f2ad74a0594c933dd8

SHA-256:
c997ee3fedc2f022e60ed9c69fb33d020901044ada116773c3213e0cd6665077

Scanner detections:
1 / 68

Status:
Potentially unwanted

Analysis date:
12/25/2024 12:49:04 PM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.TLAPIA (M)
16.3.7.12

File size:
31.3 KB (32,024 bytes)

Product version:
1.0.1.1

Copyright:
Copyright © Tlapia 2012-2013

Original file name:
sysTPLService.exe

File type:
Executable application (Win32 EXE)

Language:
Language Neutral

Common path:
C:\Program Files\systpl\systplservice.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
1/22/2013 1:00:00 AM

Valid to:
1/23/2014 12:59:59 AM

Subject:
CN=TLAPIA, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=TLAPIA, L=Montevideo, S=montevideo, C=UY

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
59F70BE7091286E5251B02778D136FF2

File PE Metadata
Compilation timestamp:
5/16/2013 4:20:14 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

.NET CLR dependent:
Yes

CTPH (ssdeep):
384:NmazkwMaeovN5avvwxyvA9PmePdYLniywQX20aePh4bXqJ0JsCn6ceEsO4LnYPLx:oaPMa/XpyKiLkch4ba6Jn6cDA8

Entry address:
0x63EE

Entry point:
FF, 25, 00, 20, 40, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 04, 00, 03, 00, 00, 00, 30, 00, 00, 80, 0E, 00, 00, 00, 50, 00, 00, 80, 10, 00, 00, 00, 68, 00, 00, 80, 18, 00, 00, 00, 80, 00, 00, 80, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 02, 00, 02, 00, 00, 00, 98, 00, 00, 80, 03, 00, 00, 00, B0, 00, 00, 80, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 01, 00, 00, 7F, 00, 00, C8, 00, 00, 80, 00, 00, 00, 00, 00, 00...
 
[+]

Developed / compiled with:
Microsoft Visual C# / Basic .NET

Code size:
17 KB (17,408 bytes)

Service
Display name:
sysTPLService

Service name:
sysTPLService.exe

Description:
sysTPL Service

Type:
Win32OwnProcess


The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to ec2-54-208-30-101.compute-1.amazonaws.com  (54.208.30.101:80)

TCP (HTTP):
Connects to www.dortmund.de  (85.22.48.42:80)

TCP (HTTP):
Connects to personal.nl.avira-update.net  (89.105.213.18:80)

TCP (HTTP):
Connects to notifier5.avira.com  (89.105.212.63:80)

TCP (HTTP):
Connects to muc03s07-in-f9.1e100.net  (173.194.44.9:80)

TCP (HTTP):
Connects to market.avira.com  (89.105.212.59:80)

TCP (HTTP):
Connects to ham02s12-in-f24.1e100.net  (173.194.113.184:80)

TCP (HTTP):
Connects to ham02s12-in-f20.1e100.net  (173.194.113.180:80)

TCP (HTTP SSL):
Connects to edge-star-shv-01-ams2.facebook.com  (31.13.64.1:443)

TCP (HTTP SSL):
Connects to channelproxy-shv-06-frc1.facebook.com  (69.171.248.16:443)

TCP (HTTP):
Connects to a2.19-217-83.deploy.akamaitechnologies.com  (2.16.217.83:80)

Remove sysTPLService.exe - Powered by Reason Core Security